1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AfilCa [17]
3 years ago
9

Write the definition of a function named printpoweroftwostars that receives a non-negative integer n and prints a line consistin

g of "2 to the n" asterisks. so, if the function received 4 it would print 2 to the 4 asterisks, that is, 16 asterisks: **************** and if it received 0 it would print 2 to the 0 (i.e. 1) asterisks: * the function must not use a loop of any kind (for, while, do-while) to accomplish its job
Computers and Technology
1 answer:
Aleksandr-060686 [28]3 years ago
4 0
To accomplish this without using a loop,
we can use math on a string.

Example:
print("apple" * 8)

Output:
appleappleappleappleappleappleappleapple

In this example,
the multiplication by 8 actually creates 8 copies of the string.

So that's the type of logic we want to apply to our problem.

<span>def powersOfTwo(number):
if number >= 0:
return print("*" * 2**number)
else:
<span>return

Hmm I can't make indentations in this box,
so it's doesn't format correctly.
Hopefully you get the idea though.

We're taking the string containing an asterisk and copying it 2^(number) times.

Beyond that you will need to call the function below.
Test it with some different values.

powersOfTwo(4) should print 2^4 asterisks: ****************</span></span>
You might be interested in
Type the correct answer in the box. Spell all words correctly.
ololo11 [35]

foud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsufoud6gdjyrxyutwrhgcghkiyiyofjxgxhdttenhdjgxjxjgztujxjxufudtduyyd6rdgtsu

5 0
2 years ago
This is tech question related to mobile and PC.
love history [14]

I am guessing the bluetooth process is same as usb proccess. So when i transfered a video via usb and took out the usb (for apple phone), there <u>was</u> a file but when i clicked it it said that the phone isn't plugged in

4 0
3 years ago
Why is it not advisable to mark tlc plates with a pen to indicate?
nikitadnepr [17]
The plate can change the function that is in it. If you were to name it wrong, you would have to debug the code and possibly rewrite it.
3 0
3 years ago
when a stock or bond certificate is delivered, it must be in good transferable form. if the certificate is badly mutilated, it m
Elena-2011 [213]

Authentication can be done by the issuer of the security.

What do you mean by authentication?

Authentication is the act of proving an assertion, such as a computer system user's identification. Authentication is the process of verifying a person's or thing's identity, as opposed to identification, which is the act of indicating that identity. It could entail validating personal identification documents, verifying the authenticity of a website with a digital certificate, carbon dating an artefact, or guaranteeing that a product or document is not counterfeit.

Only a party with access to particular company documents may authenticate a mutilated certificate. It is most likely the issuer, but it could also be the transfer agent or registrar.

To learn more about authentication
brainly.com/question/28240257

#SPJ4

6 0
1 year ago
In order for your laptop to make a wireless connection, it must first find an available __________ to connect to.
Nitella [24]
The answer is Service Set Identifier or SSID.

Every wireless router sends out a beacon signal to allow other devices such as laptops, wifi printers, personal cellphones when set to look for and connect to the routers SSID. This SSID can also be shut off or hidden from public domains so not every person stopping by can try to connect to the router via the SSID. Usually you must have a password to follow an attempt to connect to the exact wireless router.
3 0
3 years ago
Other questions:
  • A ____ is any key that uniquely identifies each row.
    15·1 answer
  • . Database connectivity software is also known as:
    11·1 answer
  • Software is giving instructions so that text is displayed on the monitor. This software is an example of _____.
    7·2 answers
  • Urgent ..algorithm and flowchart to check weather a number is odd or even ???​
    8·2 answers
  • Which of the following is the process of writing the step-by-step instructions that can be understood by a computer?
    5·1 answer
  • Cuales son las funcione basica de la computadora​
    9·1 answer
  • What is the next line? &gt;&gt;&gt; myTuple = [10, 20, 50, 20, 20, 60] &gt;&gt;&gt; myTuple.index(50) 3 1 4 2
    14·2 answers
  • Choose the term that matches the action.
    5·2 answers
  • What are the factors that affect self-confidence?
    15·1 answer
  • Can you exclude header rows from sort in excel?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!